My Opinion

nothing but my opinion

Converge ICT Solution Inc. - a service desert and teasing their customers

You are in a bad situation if you are living in an area where Converge ICT Solution Inc. is the only Internet provider. If your job or project requires a permanent Internet connection then you need to buy additional some additional load from a mobile phone provider, because the Internet from Converge ICT Solution Inc. has most of the time problems. The only thing where they have no problems or which is really functioning is their money collection. For example they are even trying to collect money by using an attorney for a cable TV contract, which has not been functioning and got cancelled for this reason. Such a case has happened to the father of my spouse.

Their actual basic offer is:

For this money, you'll get cable TV, which is only functioning if you are lucky and a very seldom functioning and castrated Internet connection having a private IP address. For example is actual the following connection information show at my router:


The offered 5 Mbit are only in the internal network available if you don't have any package loss, what has never happened during the last 3 years. Actual is the best situation a package loss of 10% until their upstream provider. Package losses of more than 60% are for Converge ICT a normal situation and not something what needs to get fixed.

An actual trace route to shows the problem:

The bottleneck gets already found at the IP address in this case. Around two yeas ago I have reported this host already and repeated the report a few times. Their only solution has been to turn of answering pings at this host. That I'm not the only one, who has problems with this amateur cable provider, Converge ICT Solutions Inc., gets shown on Twitter under the hashtag #convergeict and #pldtMyDSL.

As Converge ICT Solutions Inc. has so many problems in their Internet connection, I'm monitoring their service from the time I wake up until I'm going to bed again. During the past week their service has not been working before 7:00 am. It is understandable that they need to fix their problems and I have kept myself quiet as I have seen their service trucks in our area. These deadbeats are still thinking that their problems are getting found in the last mile. I have reported them with traces and ping statistics, where they need to start searching for their problems, but they are even resistant against technical facts coming from a third party. Last year on April 18, 2016, during a quiet time on their Internet connection, I have already reported the source of the problems (click on the screenshot to enlarge it):

The screenshot above shows the output from the open source software Ping Tracer, which makes every second a ping to each router on the way until the international connection. The problem gets shown inside the Converge network at the host with the IP is my private router and is the first router in the Converge network. shows during the monitored time 10:16 - 10:41 am not one lost package. During the same time the next router after with the IP had a package loss of 4.1%. Such an defect router can be the reason for any network problems and can result in a blocking the whole network traffic. Also the screenshot shows that the problem does not get found in the last mile.

A similar picture gets shown as yesterday, February 3, 2017, between two longer shutdowns of the Internet connection. Here the screenshot from yesterday showing the time 9:03 pm - 9:29 pm:

With other words, it cannot be what is not allowed. The network engineers from Converge ICT seems to be so much convicted about themselves, that they send out the field technicians for changing the cable modems instead of moving their own ass. The problem still stays unsolved. It does not matter to the lazy Converge network engineers, because only their customers are suffering from their incompetence.

One more fact proves that the problem needs to get searched in the routers or in the upload channels from the cable modems. During one of the visits of the Converge ICT Solutions technicians, he has exchanged the cable modem against one from Motorola. At this cable modem the upload channel can get chosen manually for the case problems are coming up. Some times it really helps to change the upload channel, but that is not a real solution for professional Internet provider. It is only a basal solution, but that fact shows that the problems are coming from a simple overbooking of the available hardware and network.

Here is a screenshot how the problem is normally building up:

The yellow bars are showing the long pings and the red one the package loss to each host. If one router blocks, because he cannot forward a package to the next router, the first one blocks too. The total black out is building up this way. Some times you can solve the problem by simple changing the upload channel and you get an acceptable Internet connection for simple browsing.

It even does not help to chose another offer from Converge because their problems are getting found in their internal network until their upstream provider. So even if you chose their fiber to home package, you'll suffer from the same problems. Not one Internet provider has different networks for their routing for their different offers.

Update 2017-02-03 7:30pm:

The following screenshot shows again a dropped line. For both drops is the staff from Converge guilty. Their stupid staff thinks, that they need to change for all their users the upload channel. The problem is, that all connections are dropping and cannot reconnect for the reason of overloading the network.

Here is a screen shot from the modem settings taken at 06:53:57 pm it shows upload channel 3:

Here the game continues. Every time the connection stops working as the upload channels gets set to 1:

At 07:12:55 pm the upload channel got again set to 1 from remote:

I have set the upload channel at 07:17:11 again to 3 and the connection is working again. From my site, I have to reboot the cable modem after setting the channel. From the remote site the channel can get changed without rebooting the cable modem:

This game has been continuing a few times until the deadbeat at the other end has given up. That are the stupid ideas from some staff in their IT department, who does not know what he is doing. So keep yourself away from such a provider, where the staff seems to get bored and are thinking they have to destroy your Internet connection.

The contact details from Converge ICT Solutions Inc.:
Converge Information and Communications Technology Solution Inc., Yamamoto Building, National Road, Cut-Cut, Pulilan, Bulacan, Philippines, Mobile No. 0933 552 5517

Main office: Reliance Center Annex 1 #99 E.Rodriguez Jr.,Ave. Bo. Ugong Pasig City, Philippines Pasig, Manila 1604 Philippinen

Office Pampanga:
5th Floor Savers Mall Bldg Balibago, Angeles, Pampanga, 2009
Phone: +63.458940100

Domain registration data from

Domain Name:
Registry Domain ID: 1649832348_DOMAIN_COM-VRSN
Registrar WHOIS Server:
Registrar URL:
Update Date: 2016-03-24T15:25:50Z
Creation Date: 2011-04-08T06:36:18Z
Registrar Registration Expiration Date: 2025-04-08T06:36:18Z
Registrar:, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Domain Status: clientRenewProhibited
Domain Status: clientDeleteProhibited
Registry Registrant ID: Not Available From Registry
Registrant Name: Converge ICT Solution Inc
Registrant Organization: Converge ICT Solution Inc
Registrant Street: 5th Floor Savers Mall Bldg Balibago
Registrant City: Angeles
Registrant State/Province: Pampanga
Registrant Postal Code: 2009
Registrant Country: PH
Registrant Phone: +63.458940100
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email:
Registry Admin ID: Not Available From Registry
Admin Name: Philip Vargas
Admin Organization: Converge ICT Solution Inc
Admin Street: 5/F SaversMaill Bldg, McArthur Hi-way
Admin City: Angeles City
Admin State/Province: Pampanga
Admin Postal Code: 2009
Admin Country: PH
Admin Phone: +63.458940100
Admin Phone Ext:
Admin Fax: +63.458940108
Admin Fax Ext:
Admin Email:
Registry Tech ID: Not Available From Registry
Tech Name: Philip Vargas
Tech Organization: Converge ICT Solution Inc
Tech Street: 5/F SaversMaill Bldg, McArthur Hi-way
Tech City: Angeles City
Tech State/Province: Pampanga
Tech Postal Code: 2009
Tech Country: PH
Tech Phone: +63.458940100
Tech Phone Ext:
Tech Fax: +63.458940108
Tech Fax Ext:
Tech Email:
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System:
>>> Last update of WHOIS database: 2017-02-04T00:00:00Z <<<


Maqsood Ahmad (L.I.O.N) - a Pakistani Muslim Coward

Maqsood Ahmad (L.I.O.N)Maqsood Ahmad declares himself in his LinkedIn profile as Director Lasani Quran (, a website which defines their vision as "Our vision for Lasani Quran is to spread Islamic knowledge throughout the world ...". If such a person like Maqsood Ahmad uses a constructed (photoshopped) more than 12 years old picture for a LinkedIn posting then he has some special intentions with his posting. Every photo is nothing else than a snapshot from a moment and says nothing about it how it has been coming to the situation. If such a picture gets constructed and used for a special purpose then this purpose is very questionable. In such a case you can only speculate about the true background. If such a speculation hits the truth then the author feels himself dismantled and deletes his posting. Maqsood Ahmad has done the same like little children are doing if they are caught in lies, he deleted his posting at LinkedIn.

What can you expect from a Islamic Quran Education institute where the Director from the institute is already a liar?

Maqsood Ahmad posted at LinkedIn with the text "There is no reason whatsoever you can point a gun to kids. Brave Palestinian kids. Salute to the cause" the following constructed picture, which should give you an impression of inhumanity:

The problem of the above picture is:

  • Everything except the person in front is drawn sharp and clear - from the rocks in front until the rocks in the background.
  • By taking a look at right side from the trousers of the person in front you'll see that there are disturbances in the image, which cannot get explained with wrinkles of the clothing. Such disturbances happens when you try to cut something from a picture where a strong contrast is not available. Here has made the guy, who has constructed the picture, some mistakes.
  • Not one photographer will make a picture within this angle if there is war and a gun is pointing to him. He will bring himself first in a secure area and make a picture afterwards.
  • Not one soldier will go down on his knees if he is alone in an insecure area. Soldiers are going in groups and protecting themselves from all directions. The person with the stone can be a red herring too and the soldier can get attacked from another side while he is concentrating himself to the one attacker.

Why is posting Maqsood Ahmad such a fake picture?

One possible answer can get found in the sentence: "Brave Palestinian kids". Instead of calling such kids to be stupid and thinking about the responsibility of the parents he is calling such a child "brave". With other words he is confirming that the Islam is a religion of war and conquest and not a religion like others which are preaching peace and love. Already this answer will make Maqsood Ahmad to one of the hate preachers.

If we are combining the posting from Maqsood Ahmad with the facts that the Muslims are using children as suicide bombers and as terrorists then the content from the posting shall help children in reaching their deadly destination. An actual report from the British Daily Mirror, Disturbing video shows children in Gaza acting out mock terrorist attacks at pre-school graduation, shows what the Muslims are understanding in humanity and the value of a human life for them. Such stupid cowards like Maqsood Ahmad like to use for their war innocent children and women. Such people like Maqsood Ahmad are a dishonor for the human race and showing us what the Islam really stands for. If someone expect that others are handling himself in humanity then he need to show first that he is a human!

Here you see a screenshot from the posting which the coward Maqsood Ahmad has already removed:

One of his friends, who even don't like to provide a manhunt picture by himself, commented:

Abdallah عبدالله عبدالرحمن
I remember this image. this girl got shot

How stupid the hat preacher Maqsood Ahmad is gets shown that he has invited his friends, who shall support him in his fake campaign, in the first two comments. One from them is the Abdallah above. The oldest version from the picture, found in Google picture search, has the date April 11, 2004. At this time in Abdallah's profile is written: "Education: Govt. College of Technology, D.A.E, Civil Engineering, 2002 – 2005". Maybe even his education is a lie like his comment above.

Maqsood Ahamd dismantles the Quran on his website to a script, which needs to get explained by qualified teachers:

This Website helps each student to learn Quran online by qualified teachers.

The sentence above is contradicting the version that the Quran is a holy script. Which God will use words by speaking to his followers which they don't understand and need to get interpreted from human teachers?

The Muslims are thinking that they can dominate the world and that is wrong. They are crying about humanity and are hiding themselves behind children and women. What can they really expect in such case? As long they are only killing each other would it not be a real problem, but as soon as they are trying to export their understanding from humanity (terror attacks) they need not wonder themselves that they'll get an answer from the other countries.

LinkedIn profile of the coward Maqsood Ahmad (L.I.O.N)

Domain registration data from 

Domain Name:
Registry Domain ID: 4913008_DOMAIN_COM-VRSN
Registrar WHOIS Server:
Registrar URL:
Updated Date: 2015-02-18T00:56:52Z
Creation Date: 2013-02-21T04:00:00Z
Registrar Registration Expiration Date: 2023-02-21T04:00:00Z
Registrar: Onlinenic Inc
Registrar IANA ID: 82
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone: +1.5107698492
Domain Status: clientTransferProhibited
Registry Registrant ID: Not Available From Registry
Registrant Name: Maqsood Ahmed
Registrant Organization:
Registrant Street: 447 General Truck Stand, Ravi Linkd Rd.
Registrant City: Lahore
Registrant State/Province: Punjab
Registrant Postal Code: 54000
Registrant Country: PK
Registrant Phone: +92.3218463454
Registrant Phone Ext:
Registrant Fax: +92.3334224186
Registrant Fax Ext:
Registrant Email:
Registry Admin ID: Not Available From Registry
Admin Name: Maqsood Ahmed
Admin Organization:
Admin Street: 447 General Truck Stand, Ravi Linkd Rd.
Admin City: Lahore
Admin State/Province: Punjab
Admin Postal Code: 54000
Admin Country: PK
Admin Phone: +92.3218463454
Admin Phone Ext:
Admin Fax: +92.3334224186
Admin Fax Ext:
Admin Email:
Registry Tech ID: Not Available From Registry
Tech Name: Muhammad Aslam
Tech Organization: infotech4it
Tech Street: Lahore
Tech City: Lahore
Tech State/Province: Punjab
Tech Postal Code: 54000
Tech Country: PK
Tech Phone: +92.3334224186
Tech Phone Ext:
Tech Fax: +92.3334224186
Tech Fax Ext:
Tech Email:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System:
>>> Last update of WHOIS database: 2015-02-18T00:56:52Z <<<


Ink war: HP exercises vigilante justice via firmware update

Hewlett PackardJustice and consumer advocates should take care at last, what the industry is doing to their customers via update features. In some cases such as the recent one from HP, it was even illegal.

With changes of a few bytes from a printer firmware, the IT giant Hewlett-Packard (HP) has just destroyed millions values of its customers: an automatic update ensures that certain ink cartridges of other manufacturers of the printers are no longer acceptable. The customer has paid both, cartridges and printer are both his property. But that does not bother the group at all.

The way how HP treats the property of its customers and the following of the property rights is disregarded, arrogant and presumptuous. HP spreads the following message for even mocking their victims: For giving the best support to their customers, the safety of their products will get continuously improved. Since the end of 2015 we have introduced in the printer models OfficeJet OfficeJet Pro and Officejet Pro X new features that secure the communication between the ink cartridge and the printer and protect HP's intellectual property. These printers could be operated with refilled or remanufactured ink cartridges with an original HP security chip; other ink cartridges may or may not work. In some cases, these are "features" have been installed as part of a firmware update. The group leaves unanswered the question of which law gives HP the right to implement these features, i.e. the shutdown of third-party cartridges have been installed.

This means that Office Jet Pro devices no longer print with special replica cartridges from far East, as well as cartridges refilled and stocked with China chips. Refill and cartridges vendors that use HP chips, are, however, not barred. For example the cartridges from Pelikan will continue to work in the HP printers.

Cat and mouse game

The repartee between the printer manufacturers and providers of alternative cartridges began even before the first cartridges chips: back then it was patented plastic cones, partition walls or integrated light-emitting diodes. Since the cartridges are equipped with a chip - officially, it should save the ink level, reverse-engineering experts build the chips of each new generation of cartridges. It takes several months for the alternative inks provider can use the replica in their cheap cartridges. The printer manufacturers responded first with new types of cartridges and better encryption, which work only with new types of printers.

Since printers and especially multifunction devices are getting smarter, manufacturers such as HP, Canon and Samsung to analyze differences between the original and replica chips and adapt the software to their devices so that they can identify and lock out replicas. Initially it worked only with newly produced batches. With cloud and mobile printing multi function devices, however, are always connected to the Internet and can install updates automatically.

A firmware update that locks out foreign chips, HP has not released for the first time. By 2015 blocked updated Office Jets cartridges Ninestar. At that time the cartridge manufacturer replied with a modified chip, which the printer accepted again. Insider are suggesting now to not allow offered firmware updates and have also warned from updates for Epson, Lexmark and Samsung devices.

For printers and multi-function devices with wireless or Ethernet connection, the automatic firmware update can usually disable via the web front-end. To call it, just enter the printer's IP address in the URL line of a browser. Otherwise you will find the option in the adjustment or the printer administrator menu.

One reason for the continuous ink-war between printer manufacturers and suppliers of alternative inks is subsidizing discount printers and multi-function devices with overpriced ink cartridges. Some manufacturers such as Brother and Epson have with some printer series (Ink Benefit, EcoTank) abandoned this form of financing and selling expensive printers, which however included ink for thousands of pages and can be refilled as low with original ink that replacement inks worth barely.

War on the backs of customers

In plain language, that's nothing different, that HP will fight its war with their mostly Asian competitors on the back of their customers and violated their rights. Who wants to go against product falsifications or patent infringing copies, requires judicial orders to let them seize and destroy. HP but simply enters the printer of its customers via network, modifies the software and thus makes the cartridges, which they are believing that they are illegal, useless. This is a new form of vigilantism by firmware update. The competitor itself or commercial wholesalers, but the customer also not as usual have the damage. This is a novelty.

It is time that the judiciary takes care of such machinations. The intentional change of a computer system is punishable as computer sabotage pursuant to § 303b paragraph 1 point 3 of the Criminal Code in Germany. Other countries have a similar right situation. All such update functions fulfill this offense. Decriminalization they can therefore only stay if they are justified by a consent of the owner.

Making HP liable

This is no different than the syringe a doctor gives: The syringe is a bodily injury and only covered that we agree on the basis of thorough information. Nobody would sign immediately upon entering the practice, that the doctor now and for all eternity can do what he wants, without any responsibility and assumes the risk of any side effects. And no judge would let go by such as consent for a medical intervention. The IT industry, but feels to do it exactly according to the motto: Where no plaintiff, there no judge.

And it's time that worry the consumer centers to these shenanigans. You can warn companies that approve such conditions by their customers to stop and if necessary sue to refrain from such contractual clauses. Individual consumers can hardly. Because the damage may be low for individual consumers, in the sum of thousands affected in one small country alone, it goes into millions and the company should be held liable.


Malware from the military and police is ruling the black market

Black Market Live from the governmentThe black market for malware is far from settled beyond any prosecution because it is ruled by the military and police of Western democracies.

Two weeks after an extensive program package had arrived for attacking firewalls from leading companies, came on Friday the so far most dangerous malware for iPhones to the public. Although the circumstances that they become known are completely different, both cases have one thing in common. Neither against Apple's iOS nor that against the operating systems of all firewalls directed package has a criminal background.

In both cases, the malicious files from the public sector and there just not from the usual suspects "Cyber rogues" Russia or China. For the attack tools on firewalls from Cisco to Fortinet, the NSA was at least the client. The iPhone malware got developed by the Israeli company NSO, a supplier for the Mossad.

We'll find additional at the Wall Street Journal article "Smartphones Become Next Frontier in Cybersecurity" from Jul 31, 2014 the information:

Private-equity firm Francisco Partners Management LLC earlier this year paid $110 million to acquire NSO Group, an Israeli startup that aims to help governments spy on individual mobile phones

The same company also has the firewall vendor Barracuda and specialized on Network Monitoring company Blue Coat in their portfolio.

Pandora's Box

Why the black market is settled for such malware far beyond any prosecution? This market would be interfering at least since 2000, no longer criminals, but military and police authorities. This Pandora's Box was open since 2000 and criminals were to distinguish more difficult by the authorities.

The US has begun and just tried once, whether they can enforce the use of malware in their country. This has at least according to its laws and works. After that, more and more Western democracies have been taking their right to use malware, first only in the intelligence field; afterwards they used it also in law enforcement. The so-called 'police Trojans' are nothing than malicious software.

Legalization of criminal activities

Since almost not one country had the necessary know-how and resources to develop all these attack tools themselves, they outsourced the production and maintenance to private companies. What was still considered criminal in the 90s, got step by step legalized. The black market for malware was therefore created by government agencies. Their demand fueled the market for malicious software continue running on, which is reflected in rapidly growing sales of commercial operators. The increasing sales in this sector are the sole reason why more and more new companies emerge in this market.

All Cisco Firewalls are affected

All versions of the operating systems from the Cisco product series PIX and ASA within the last 15 years are clearly concerned with very few exceptions. The development of attacking tools therefore launched shortly after the first PIX were delivered in 1996, the very last specimens of this product range reached just the end of their lifetime.

The so-called "Equation Group", of which the as yet unknown "Shadow Broker" these files allegedly stolen has, so the firewalls alone systematically attacked by Cisco for at least 15 years and their malicious code obviously adapted to every major update of the operating system. For the newer firewalls from the type ASA were hitherto found two so called "0-Day exploits", the name for attacking software for previously undiscovered vulnerabilities in an operating system. Cisco has indeed already ruled with a security update for its ASA operating system, but it is questionable whether it also against modified versions of the attack software helps.

Three "0 day exploits" against iPhone

The intruder tool for iPhone consists of three of these "0-day exploits" that contaminate the device via a single link in a text message, which had resulted in an investigation into the security firm "Lookout" with Canadian "Citizen Lab". The human rights activist Ahmed Mansoor from the United Arab Emirates had received an SMS with an embedded link what allegedly referred to a website with new information on torture in the dictatorial Emirates.

Mansoor did not click the link, but forwarded the SMS to the Canadian Citizen Lab for examination. Together with the dedicated security company for smartphones and tablets the company Lookout tested the consequences of a click on this link. The result has been the installation of a "completely invisible" spying software from the Israeli "cyber war" company NSO. Apparently for "security reasons" NSO even does not maintain a website.

The human rights activist Ahmed Mansoor was attacked for the third time since 2011. The company FinFisher (aka "Gamma Group") comes from Germany, "Hacking Team" is Italian origin.

The powerlessness of prosecutors

Although both cases are mounted quite different, and the circumstances are particularly in the case of firewall hacks in the darkness, but can draw some conclusions without overusing speculations. In both cases, the military intelligence services from Western democracies (US and Israel) are the principal for this high-quality malicious software. The anti-malware iPhones was sold to an alliance with the West dictatorship in the Persian Gulf, which thus spied the democratic opposition in his own country.

The malicious software to firewalls was commissioned by the US secret service NSA in order to attack the products for network security of the leading US companies Cisco, Fortinet and Juniper. Of particular interest in this case is that of all the world’s leading firewall manufacturers, the Israeli-American company Checkpoint, is missing from the recent publications from the until now unknown "Shadow Broker".

Schizophrenia, black market, cyber crime - a conclusion

From these two paradoxes is it not difficult to deduce, use what schizophrenic situation the Western democracies by the decision, methods and tools of criminals, have conjured up. The States thus have even created a global black market for "cyber weapons" and made large, parallel rise offenses of "cyber crime" range exponentially in higher spheres.

The prosecutors are faced with an almost impossible task because they can never take the backers, so the producers, namely because the own military or even the police authorities themselves their clients. The authorities of Western democracies can save their warnings against "Russian hackers" or "the Chinese" therefore, because these accusations are just embarrassing. It is quite comparable to that scene from the "last days of humanity" where one prostitute insulted another one with the words "Such a whore!".